{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,18]],"date-time":"2025-10-18T10:27:24Z","timestamp":1760783244583},"reference-count":35,"publisher":"Elsevier BV","issue":"12","license":[{"start":{"date-parts":[[2010,7,1]],"date-time":"2010-07-01T00:00:00Z","timestamp":1277942400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computer Communications"],"published-print":{"date-parts":[[2010,7]]},"DOI":"10.1016\/j.comcom.2010.02.032","type":"journal-article","created":{"date-parts":[[2010,3,9]],"date-time":"2010-03-09T09:48:23Z","timestamp":1268128103000},"page":"1414-1427","source":"Crossref","is-referenced-by-count":25,"title":["Measuring long-term location privacy in vehicular communication systems"],"prefix":"10.1016","volume":"33","author":[{"given":"Zhendong","family":"Ma","sequence":"first","affiliation":[]},{"given":"Frank","family":"Kargl","sequence":"additional","affiliation":[]},{"given":"Michael","family":"Weber","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.comcom.2010.02.032_bib1","series-title":"Equilibrium and Advanced Transportation Modeling","first-page":"27","article-title":"Activity based travel demand model systems","author":"Ben-akiva","year":"1998"},{"issue":"1","key":"10.1016\/j.comcom.2010.02.032_bib2","doi-asserted-by":"crossref","first-page":"46","DOI":"10.1109\/MPRV.2003.1186725","article-title":"Location privacy in pervasive computing","volume":"2","author":"Beresford","year":"2003","journal-title":"IEEE Pervasive Computing"},{"key":"10.1016\/j.comcom.2010.02.032_bib3","unstructured":"Andrew J. Blumberg, Peter Eckersley, On locational privacy, and how to avoid losing it forever. Technical report, Electronic Frontier Foundation, August 2009."},{"key":"10.1016\/j.comcom.2010.02.032_bib4","unstructured":"Levente Buttyan, Tamas Holczer, Istvan Vajda, On the effectiveness of changing pseudonyms to provide location privacy in VANETs. in: ESAS 2007, July 2007."},{"key":"10.1016\/j.comcom.2010.02.032_bib5","doi-asserted-by":"crossref","unstructured":"C. Diaz, S. Seys, J. Claessens, B. Preneel, Towards measuring anonymity, in: Workshop on Privacy Enhancing Technologies, 2002.","DOI":"10.1007\/3-540-36467-6_5"},{"key":"10.1016\/j.comcom.2010.02.032_bib6","doi-asserted-by":"crossref","unstructured":"Florian D\u00f6tzer, Privacy issues in vehicular ad hoc networks, in: Workshop on Privacy Enhancing Technologies, 2005.","DOI":"10.1007\/11767831_13"},{"key":"10.1016\/j.comcom.2010.02.032_bib7","doi-asserted-by":"crossref","unstructured":"Elmar Schoch, Frank Kargl, Tim Leinm\u00fcller, Stefan Schlott, Panagiotis Papadimitratos, Impact of pseudonym changes on geographic routing in vanets, in: ESAS, November 2006.","DOI":"10.1007\/11964254_6"},{"key":"10.1016\/j.comcom.2010.02.032_bib8","doi-asserted-by":"crossref","unstructured":"Lars Fischer, Stefan Katzenbeisser, Claudia Eckert, Measuring unlinkability revisited, in: WPES\u201908: Proceedings of the Seventh ACM workshop on Privacy in the electronic society, Alexandria, Virginia, October 27 2008.","DOI":"10.1145\/1456403.1456421"},{"key":"10.1016\/j.comcom.2010.02.032_bib9","doi-asserted-by":"crossref","unstructured":"Julian Freudiger, Reza Shokri, Jean-Pierre Hubaux, On the optimal placement of mix zones, in: PET, 2009.","DOI":"10.1007\/978-3-642-03168-7_13"},{"key":"10.1016\/j.comcom.2010.02.032_bib10","unstructured":"Julien Freudiger, Maxim Raya, Mark Felegyhazi, Panos Papadimitratos, Jean-Pierre Hubaux, Mix-zones for location privacy in vehicular networks, in: WiN-ITS, 2007."},{"key":"10.1016\/j.comcom.2010.02.032_bib11","doi-asserted-by":"crossref","unstructured":"Matthias Gerlach, Felix G\u00fcttler. Privacy in VANETs using changing pseudonyms \u2013 ideal and real, in: VTC2007-Spring, 2007, pp. 2521\u20132525.","DOI":"10.1109\/VETECS.2007.519"},{"key":"10.1016\/j.comcom.2010.02.032_bib12","first-page":"390","article-title":"On the anonymity of home\/work location pairs","volume":"vol. 5538","author":"Golle","year":"2009"},{"key":"10.1016\/j.comcom.2010.02.032_bib13","series-title":"MobiSys\u201903: Proceedings of the First International Conference on Mobile Systems, Applications and Services","first-page":"31","article-title":"Anonymous usage of location-based services through spatial and temporal cloaking","author":"Gruteser","year":"2003"},{"key":"10.1016\/j.comcom.2010.02.032_bib14","unstructured":"Marco Gruteser, Baik Hoh, On the anonymity of periodic location samples, in: Security in Pervasive Computing 2005, Boppard, Germany, vol. 3450, 2005, pp. 179\u2013192."},{"issue":"2","key":"10.1016\/j.comcom.2010.02.032_bib15","doi-asserted-by":"crossref","first-page":"147","DOI":"10.1002\/j.1538-7305.1950.tb00463.x","article-title":"Error detecting and error correcting codes","volume":"29","author":"Hamming","year":"1950","journal-title":"Bell System Technical Journal"},{"issue":"4","key":"10.1016\/j.comcom.2010.02.032_bib16","doi-asserted-by":"crossref","first-page":"38","DOI":"10.1109\/MPRV.2006.69","article-title":"Enhancing security and privacy in traffic-monitoring systems","volume":"5","author":"Hoh","year":"2006","journal-title":"IEEE Pervasive Computing"},{"key":"10.1016\/j.comcom.2010.02.032_bib17","doi-asserted-by":"crossref","unstructured":"Baik Hoh, Marco Gruteser, Hui Xiong, Ansaf Alrabady, Preserving privacy in GPS traces via density-aware path cloaking, in: ACM Conference on Computer and Communications Security (CCS), 2007.","DOI":"10.1145\/1315245.1315266"},{"key":"10.1016\/j.comcom.2010.02.032_bib18","unstructured":"Pat S. Hu, Timothy R. Reuscher, Summary of travel trends, 2001 national household travel survey. US Department of Transportation, Federal Highway Administration, December 2004."},{"key":"10.1016\/j.comcom.2010.02.032_bib19","doi-asserted-by":"crossref","unstructured":"Leping Huang, Hiroshi Yamane, Kanta Matsuura, Kaoru Sezaki, Towards modeling wireless location privacy, in: Privacy Enhancing Technologies, 2005, pp. 59\u201377.","DOI":"10.1007\/11767831_5"},{"key":"10.1016\/j.comcom.2010.02.032_bib20","doi-asserted-by":"crossref","first-page":"49","DOI":"10.1109\/MSP.2004.26","article-title":"The security and privacy of smart vehicles","volume":"4","author":"Hubaux","year":"2004","journal-title":"IEEE Security and Privacy"},{"key":"10.1016\/j.comcom.2010.02.032_bib21","doi-asserted-by":"crossref","unstructured":"John Krumm, Inference attacks on location tracks, in: Fifth International Conference on Pervasive Computing, Toronto, Canada, May 2007, pp. 127\u2013143.","DOI":"10.1007\/978-3-540-72037-9_8"},{"key":"10.1016\/j.comcom.2010.02.032_bib22","unstructured":"Zhendong Ma, Frank Kargl, Michael Weber, Pseudonym-on-demand: a new pseudonym refill strategy for vehicular communications, in: WiVeC 2008, Calgary, Canada, September 2008."},{"key":"10.1016\/j.comcom.2010.02.032_bib23","unstructured":"Zhendong Ma, Frank Kargl, Michael Weber, A location privacy metric for v2x communication systems, in: IEEE Sarnoff Symposium, Princeton, NJ, USA, March 2009."},{"key":"10.1016\/j.comcom.2010.02.032_bib24","unstructured":"Zhendong Ma, Frank Kargl, Michael Weber, Measuring location privacy in V2X communication systems with accumulated information, in: IEEE MASS\u201909, Macau, China, October 2009."},{"issue":"11","key":"10.1016\/j.comcom.2010.02.032_bib25","doi-asserted-by":"crossref","first-page":"100","DOI":"10.1109\/MCOM.2008.4689252","article-title":"Secure vehicular communications: Design and architecture","volume":"46","author":"Papadimitratos","year":"2008","journal-title":"IEEE Communications Magazine"},{"key":"10.1016\/j.comcom.2010.02.032_bib26","unstructured":"P. Papadimitratos, A. Kung, Jean-Pierre Hubaux, F. Kargl, Privacy and identity management for vehicular communication systems: A position paper, in: Workshop on Standards for Privacy in User-Centric Identity Management, Zurich, Switzerland, July 2006."},{"key":"10.1016\/j.comcom.2010.02.032_bib27","unstructured":"Andreas Pfitzmann, Marit Hansen, Anonymity, unlinkability, undetectability, unobservability, pseudonymity, and identity management \u2013 a consolidated proposal for terminology. Technical report, TU Dresden, v0.31, February 2008."},{"issue":"8","key":"10.1016\/j.comcom.2010.02.032_bib28","doi-asserted-by":"crossref","first-page":"1569","DOI":"10.1109\/JSAC.2007.071007","article-title":"Amoeba: robust location privacy scheme for vanet","volume":"25","author":"Sampigethaya","year":"2007","journal-title":"IEEE Journal on Selected Areas in Communications"},{"key":"10.1016\/j.comcom.2010.02.032_bib29","doi-asserted-by":"crossref","unstructured":"Florian Schaub, Zhendong Ma, Frank Kargl, Privacy requirements in vehicular communication systems, in: IEEE International Conference on Privacy, Security, Risk, and Trust (PASSAT 2009), Symposium on Secure Computing (SecureCom09), Vancouver, Canada, August 2009.","DOI":"10.1109\/CSE.2009.135"},{"key":"10.1016\/j.comcom.2010.02.032_bib30","doi-asserted-by":"crossref","unstructured":"A. Serjantov, G. Danezis, Towards an information theoretic metric for anonymity, in: Workshop on Privacy Enhancing Technologies, 2002.","DOI":"10.1007\/3-540-36467-6_4"},{"key":"10.1016\/j.comcom.2010.02.032_bib31","doi-asserted-by":"crossref","first-page":"379","DOI":"10.1002\/j.1538-7305.1948.tb01338.x","article-title":"A mathematical theory of communication","volume":"27","author":"Shannon","year":"1948","journal-title":"Bell System Technical Journal"},{"key":"10.1016\/j.comcom.2010.02.032_bib32","doi-asserted-by":"crossref","unstructured":"Sandra Steinbrecher, Stefan K\u00f6psell, Modelling unlinkability, in: Workshop on Privacy Enhancing Technologies, 2003, pp. 32\u201347.","DOI":"10.1007\/978-3-540-40956-4_3"},{"issue":"5","key":"10.1016\/j.comcom.2010.02.032_bib33","doi-asserted-by":"crossref","first-page":"557","DOI":"10.1142\/S0218488502001648","article-title":"k-Anonymity: a model for protecting privacy","volume":"10","author":"Sweeney","year":"2002","journal-title":"International Journal on Uncertainty, Fuzziness and Knowledge-based Systems"},{"key":"10.1016\/j.comcom.2010.02.032_bib34","doi-asserted-by":"crossref","unstructured":"Bj\u00f6rn Wiedersheim, Frank Kargl, Zhendong Ma, Panagiotis Papadimitratos, Privacy in inter-vehicular networks: why simple pseudonym change is not enough, in: Proceedings of the Seventh International Conference on Wireless On-demand Network Systems and Services (WONS 2010), February 2010.","DOI":"10.1109\/WONS.2010.5437115"},{"key":"10.1016\/j.comcom.2010.02.032_bib35","doi-asserted-by":"crossref","unstructured":"Ye Zhu, Yongjian Fu, Huirong Fu, On privacy in time series data mining, in: PAKDD, 2008, pp. 479\u2013493.","DOI":"10.1007\/978-3-540-68125-0_42"}],"container-title":["Computer Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0140366410001076?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0140366410001076?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2019,5,26]],"date-time":"2019-05-26T19:29:52Z","timestamp":1558898992000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0140366410001076"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,7]]},"references-count":35,"journal-issue":{"issue":"12","published-print":{"date-parts":[[2010,7]]}},"alternative-id":["S0140366410001076"],"URL":"https:\/\/doi.org\/10.1016\/j.comcom.2010.02.032","relation":{},"ISSN":["0140-3664"],"issn-type":[{"value":"0140-3664","type":"print"}],"subject":[],"published":{"date-parts":[[2010,7]]}}}